Table 25 Comparative analysis of security mechanisms in VANETs.
From: A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs
Criteria | Blockchain-Based | PKI-Based | Trust-Based | AI-Based IDS |
|---|---|---|---|---|
Scalability | ✗ (2/5) | ✓ (4/5) | ✓ (4/5) | Medium (3/5) |
Latency | ✗ (1/5) | ✓ (4/5) | ✓ (4/5) | Medium (3/5) |
Tamper resistance | ✓ (5/5) | Medium (3/5) | ✗ (2/5) | ✗ (2/5) |
Trust management | ✓ (4/5) | ✗ (2/5) | ✓ (5/5) | Medium (3/5) |
Detection of unknown attacks | ✗ (1/5) | ✗ (1/5) | ✗ (2/5) | ✓ (5/5) |
Explainability/transparency | ✓ (4/5) | ✓ (4/5) | ✓ (4/5) | ✗ (2/5) |
Suitability for real-time use | ✗ (1/5) | ✓ (5/5) | ✓ (4/5) | Medium (3/5) |
Resource consumption | ✗ (2/5) | ✓ (5/5) | ✓ (4/5) | ✗ (2/5) |
Resilience to sybil attacks | ✓ (5/5) | ✗ (2/5) | Medium (3/5) | ✓ (4/5) |
Overall security robustness | ✓ (4/5) | Medium (3/5) | Medium (3/5) | ✓ (5/5) |